Search Results - (( location detection system algorithm ) OR ( label classification system algorithm ))
Search alternatives:
- classification system »
- label classification »
- location detection »
- system algorithm »
-
1
Transformer-Based Model for Malicious URL Classification
Published 2024Subjects: “…Malicious uniform resource locator classification…”
Conference Paper -
2
-
3
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…In pattern recognition system, achieving high accuracy in pattern classification is crucial. …”
Get full text
Get full text
Thesis -
4
-
5
Performances of machine learning algorithms for binary classification of network anomaly detection system
Published 2018“…The finding showed that AODE algorithm is performed well in term of accuracy and processing time for binary classification towards UNSW-NB15 dataset.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…It is set to label since it has no label class. The classification is set to two categories: Eligible or Ineligible. …”
Get full text
Get full text
Thesis -
7
Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout
Published 2025“…Seven machine learning models—Artificial Neural Network (ANN), Random Forest (RF), Decision Tree (DTT), k-Nearest Neighbors (k-NN), Naïve Bayes (NB), Support Vector Machine (SVM), and Deep Neural Network (DNN)—were used for multi-label classification of the complications. The study employed two MLC frameworks: Problem Transformation methods (Binary Relevance, Classifier Chains, Label Power Set, and Calibrated Label Ranking) and Algorithm Adaptation. …”
Get full text
Get full text
Thesis -
8
Classification of JPEG files by using extreme learning machine
Published 2018“…This paper proposes an Extreme Learning Machine (ELM) algorithm to assign a class label of JPEG or Non-JPEG image for files in a continuous series of data clusters. …”
Get full text
Get full text
Article -
9
VEHICLE CLASSIFICATION USING NEURAL NETWORKS AND IMAGE PROCESSING
Published 2022“…The aim of this study is to propose a vehicle classification scheme where YOLO v5 algorithm and Faster R-CNN algorithm are being implemented separately into vehicle classification, followed by comparison of result between these two algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Car plate detection system
Published 2005“…This is because if the system fails to detect the location of the car plate, then the whole system is a failure because recognition can only be done after successful plate location. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Extreme learning machine classification of file clusters for evaluating content-based feature vectors
Published 2018“…The files are allocated in a continuous series of clusters. The ELM algorithm is applied to the DFRWS (2006) dataset and the results show that the combination of the three methods produces 93.46% classification accuracy.…”
Get full text
Article -
12
Face detection and stereo matching algorithms for smart surveillance system with IP cameras
Published 2010“…The research consists of algorithm development in surveillance system including face detection, stereo matching, location estimation and implementation with ACTi PTZ camera. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Diagnostic And Classification System For Kids With Learning Disabilities
Published 2017“…In this research, we propose an automated diagnostic and classification system. The system is trained by pre-classified data of 857 school children scores in spelling and reading. …”
Get full text
Get full text
Proceeding -
14
Anomaly detection in ICS datasets with machine learning algorithms
Published 2021“…The machine learning algorithms have been performed with labeled output for prediction classification. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Content-based feature selection for music genre classification
Published 2022Get full text
Get full text
Get full text
Article -
16
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. However, numerous data mining techniques have been successfully applied in this area to find intrusions hidden in large amounts of audit data through classification, clustering or association rule. …”
Get full text
Get full text
Get full text
Article -
17
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024Subjects: “…communication system…”
Article -
18
Development of vehicle counting system by using background subtraction technique / Muhammad Fadhli Md Azemin
Published 2018“…With a view to improvement, it is proposed to develop a unique algorithm for vehicle classification and counting using Gaussian Mixture Model (GMM) and blob analysis method. …”
Get full text
Get full text
Student Project -
19
A comparative study in classification techniques for unsupervised record linkage model
Published 2011“…In order to utilize the supervised classification algorithms without consuming a lot of time for labeling data manually, a two step method which selects the training data automatically has been proposed in previous studies. …”
Get full text
Get full text
Get full text
Article -
20
Detection of leak size and its location in a water distribution system by using K-NN / Nasereddin Ibrahim Sherksi
Published 2020“…Secondly, the data collected from the main valve chamber controllers, which are located in the main pipes. The successfully achieved four set objectives inclusive of (1) a new classification model to detect water leakage, (2) analysis of the effects of leakage size on the variables within a WDS, i.e. flow, pressure, pipe volume, velocity and water demand, (3) locating and specifying the leakage size in the WDS, and (4) evaluate the performance of the designed K-NN algorithm for accurate leak detection. …”
Get full text
Get full text
Thesis
